Papers from 2005
Service discovery in wireless ad-hoc control networks, Shengrong Bu and F. Naghdy
Wireless ad-hoc control networks, Shengrong Bu and Fazel Naghdy
Sketch-based image matching Using Angular partitioning, A. Chalechale, G. Naghdy, and Alfred Mertins
Using spatial cues for meeting speech segmentation, E Cheng, J Lukasiak, Ian S. Burnett, and David A. Stirling
Teaching automated test case generation, Tsong Yueh Chen, Fei-Ching Kuo, and Zhiquan Zhou
The behavior of MANET routing protocols in realistic environments, K. Chin
ArDeZ: a low power asymmetric rendezvous MAC for sensor networks, K. Chin and Mohammed Raad
A novel IEEE 802.15.3 CTA sharing protocol for supporting VBR streams, Kwan-Wu Chin and Darryn Lowe
A simulation study of TCP over the IEEE 802.15.3 MAC, Kwan-Wu Chin and Darryn Lowe
Routing in MANETs with address conflicts, Kwan-Wu Chin, Darryn Lowe, and W. H. O. Lau
Rational tetrahedra with edges in arithmetic progression, Catherine Chisholm and J. A. MacDougall
Generic construction of (identity-based) perfect concurrent signatures, Sherman S. M. Chow and Willy Susilo
A networked virtual environment communications model using priority updating, Yang-Wai Chow, Ronald Pose, and Matthew Regan
Design issues in human visual perception experiments on region warping, Yang-Wai Chow, Ronald Pose, and Matthew Regan
Large object segmentation with region priority rendering, Yang-Wai Chow, Ronald Pose, and Matthew Regan
Region warping in a virtual reality system with priority rendering, Yang-Wai Chow, Ronald Pose, and Matthew Regan
The ARP virtual reality system in addressing security threats and disaster scenarios, Yang-Wai Chow, Ronald Pose, and Matthew Regan
The effects of head-mounted display attributes on human visual perception of region warping distortions, Yang-Wai Chow, Ronald Pose, Matthew Regan, and James Phillips
Exploring sociocentric and egocentric approaches for social network analysis, Kenneth K S Chung, Liaquat Hossain, and Joseph Davis
Two sides of market orientation and the link to performance, Tim Coltman and Timothy M. Devinney
Strategy Content and Process in the Context of E-Business Performance, Tim R. Coltman, Timothy Devinney, and Y. Doz
Asterism decoding for turbo coded MIMO systems, Phillip Conder and Tadeusz A. Wysocki
The structure and components of E-mall business models, Renae Cooper and Katina Michael
Hypoplasticity theory for granular materials- II:Three-dimensional axially symmetric exact solutions, G. M. Cox and James M. Hill
Some exact velocity profiles for granular flow in converging hoppers, G. M. Cox and James M. Hill
Hypoplasticity theory for granular materials - I: Two-dimensional plane strain exact solutions, G. M. Cox and James M. Hill
Perturbation solutions for flow through symmetrical hoppers with inserts and asymmetrical wedge hoppers, G. M. Cox, Scott McCue, Ngamta Thamwattana, and James M. Hill
A loss function approach to identifying environmental exceedances, Peter F. Craigmile, Noel A. Cressie, Thomas J. Santner, and Youlan Rao
Lognormal kriging: bias adjustment and kriging variances, Noel A. Cressie and Martina Pavlicova
Likelihood-based estimation for Gaussian MRFs, Noel A. Cressie, Oliver Perrin, and Christine Thomas-Agnan
Geostatistical prediction of spatial extremes and their extent, Noel A. Cressie, J Zhang, and Peter Craigmile
A technological model to define access to electronic clinical records, A. Dalley, J. Fulcher, D. Bomba, K. Lynch, and P. Feltham
Conceptual modelling of computations on data streams, Anita Dani and Janusz Getta
Efficient Delivery within the MPEG-21 Framework, S. J. Davis and I. Burnett
Exchanging XML multimedia containers using a binary XML protocol, S. J. Davis and I. Burnett
Collaborative editing using an XML protocol, S. J. Davis and I. S. Burnett
Application of Competitive Clustering to Acquisition of Human Manipulation Skills, S. Dong and F. Naghdy
Manipulation skills acquisition through state classification and dimension decrease, S. Dong and F. Naghdy
Managing virtual and physical mobility for mobile immersive voice communications, Mehran Dowlatshahi and Farzad Safaei
MPEG-21 in backpack journalism scenario, G. Drury and I. Burnett
Design of non-fragile H∞ controller for active vehicle suspensions, Haiping Du, James Lam, and Kam Sze
H∞ disturbance attenuation for uncertain mechanical systems with input delay, Haiping Du, James Lam, and Kam Sze
Semi-active H∞ control of vehicle suspension with magneto-rheological dampers, Haiping Du, Kam Sze, and James Lam
Symmetry Solutions for Transient Solute Transport in Unsaturated Soils with Realistic Water Profile, Maureen P. Edwards, R Joel Moitsheki, and Philip Broadbridge
Satellite DVB multicast for remote desert community messaging, A. Eyers and Mehran Abolhasan
Orthogonal Designs with Quaternion Elements, K. Finlayson, Jennifer Seberry, Tadeusz A. Wysocki, and Tianbing Xia
The power and influence in some Youden squares and secret sharing, L. Fitina, Ken Russell, and Jennifer Seberry
Genetic evaluation of crossbred lamb production. 2. Breed and fixed effects for post-weaning growth, carcass, and wool of first-cross lambs, N. Fogarty, V. Ingham, Arthur Gilmour, L. Cummins, G. Gaunt, J. Stafford, J. Hocking Edwards, and R. Banks
Genetic evaluation of crossbred lamb production. 1. Breed and fixed effects for birth and weaning weight of first-cross lambs, gestation length, and reproduction of base ewes, N. Fogarty, V. Ingham, Arthur R. Gilmour, L. Cummins, G. Gaunt, J. Stafford, J. Hocking Edwards, and R. Banks
Secure, remote, ubiquitous access of electronic health records, John Fulcher
Preparing CS Honours students for a research career: the Wollongong experience, John Fulcher and Ian Piper
Distance education teaching and tutoring: two evolving Australian models, A. Fuller, Penelope McFarlane, Patricia Cretchley, Christine McDonald, and Cam Le Lam
A New Client Puzzle Scheme Against Dos/DDoS Attacks, Yi Gao, Yi Mu, and Willy Susilo
Preventing DoS Attacks with a New Client Puzzle Scheme, Yi Gao, Yi Mu, and Willy Susilo
Stereophonic acoustic echo cancellation, Fenglu Ge, Prashan Premaratne, and Jiangtao Xi
On Adaptive and Online Data Integration, J. R. Getta
Belief Liberation (and Retraction), Aditya K. Ghose, Richard Booth, Samir Chopra, and Thomas Meyer
Performance of Java middleware - Java RMI, JAXRPC, and CORBA, N. A. B. Gray
Dealing with Web service QoS factors using constraint hierarchy, Y. Guan and Aditya K. Ghose
Executable specifications for agent oriented conceptual modelling, Y. Guan and Aditya K. Ghose
Use constraint hierarchy for non-functional requirements analysis, Y. Guan and Aditya K. Ghose
Practical application of support-based distributed search, Peter Harvey, C. F. Chang, and Aditya K. Ghose
Experimental characterisation of prototype HTS SMES device, Christopher J. Hawley, Dominic Cuiuri, and Christopher David Cook
Design and preliminary results of a prototype HTS SMES device, Christopher J. Hawley and S. A. Gower
New concepts of multiple tests and their use for evaluating high-dimensional EEG data, Claudia Hemmelmann, Manfred Horn, Thomas Suesse, Ruediger Vollandt, and Sabine Weiss
Power quality (PQ) survey reporting: discrete disturbance limits, H. M. Herath, V. J. Gosbell, and S. Perera
Automated operator selection on Genetic Algorithms, Fredrik G. Hilding and Koren Ward
Curve Fitting, Differential Equations and the Riemann Hypothesis, James Hill
On some integrals involving functions, James Hill
Mathematics and mechanics of granular materials, James Hill and A. P. S. Selvadurai
On Orthogonal Designs in Order 48, W. H. Holzmann, H Kharaghani, Jennifer Seberry, and B. Tayfeh-Rezaie
Security analysis of Michael: the IEEE 802.11i message integrity code, Jianyong Huang, Jennifer Seberry, Willy Susilo, and Martin W. Bunder
Simple implementations of mutually orthogonal complementary sets of sequences, Xiaojing Huang
MMSE-optimal approximation of continuous-phase modulated signal as superposition of linearly modulated pulses, Xiaojing Huang and Y. Li
Simple CPM receivers based on a switched linear modulation model, Xiaojing Huang and Y. Li
Short designated verifier proxy signature from pairings, Xinyi Huang, Yi Mu, Willy Susilo, and Futai Zhang
Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world, Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang
On the security of certificateless signature scheme from Asiacrypt 2003, Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang
Fringe pattern profilometry based on inverse function analysis, Y. Hu, Jiangtao Xi, Enbang Li, Joe F. Chicharo, and Zongkai Yang
Shift estimation method based fringe pattern profilometry and performance comparison, Y. Hu, Jiangtao Xi, Enbang Li, Joe F. Chicharo, and Zongkai Yang
Generalized analysis model for fringe pattern profilometry, Y. Hu, Jiangtao Xi, Z. Yang, Enbang Li, and Joe F. Chicharo
Measuring the Maturity Level of a Community Portal, Peter N. Hyland and Lejla Vrazalic
Latency and scalability: a survey of issues and techniques for supporting networked games, Xinbo Jiang, Farzad Safaei, and P. Boustead
Lie group symmetry analysis for granular media stress equations, Ignatius Johnpillai, Scott McCue, and James M. Hill
Multiple distributed generators for distribution feeder voltage support, M A. Kashem and Gerard Ledwich
Novel architecture for surveillance cameras with complementary metal oxide semiconductor image sensors, Igor Kharitonenko, Wanqing Li, and Chaminda Weerasinghe
A digital pixel sensor array with programmable dynamic range, A. Kitchen, A. Bermak, and Abdesselam Bouzerdoum
Using digital tickets to protect personal privacy, Yibing Kong, Jennifer Seberry, Janusz R. Getta, and Ping Yu
A Cryptographic Solution for General Access Control, Y. Kong, Jennifer Seberry, J. R. Getta, and Ping Yu
Values of Minors of Some Infinite Families of Matrices Constructed from Supplementary Difference Sets and Their Application to the Growth Problem, C. Koukouvinos, M. Mitrouli, and Jennifer Seberry
On the growth problem for skew and symmetric conference matrices, C. Kravvaritis, M. Mitrouli, and Jennifer Seberry
Combining agent-oriented conceptual modelling with the UML sequences diagram, Aneesh Krishna and Aditya K. Ghose
Loosely-coupled consistency between agent-oriented conceptual models and Z specifications, Aneesh Krishna, Aditya K. Ghose, and Sergiy A. Viklomir
Design of a Generic, Vectorised, Machine-Vision library, Bing-Chang Lai and Phillip J. McKerrow
Revised land freight external costs in Australia, Philip Laird
Australian freight railways for a new century, Philip G. Laird, Max Michell, Alex Stoney, and Gabriella Adorni-Braccesi
Adaptive Modeling of Vehicle Mirror Vibrations by Predictive Compensation, Antoine Larchez and Fazel Naghdy
A Protected Digital Item Declaration Language for MPEG-21, S. Lauf and I. Burnett
Implementation of a mobile MPEG-21 peer, Shane Lauf and Ian S. Burnett
A simple element inverse jacket transform coding, Moon Ho Lee and Kenneth Finlayson